Visible to the public A Comparative Study on security breach in Fog computing and its impact

TitleA Comparative Study on security breach in Fog computing and its impact
Publication TypeConference Paper
Year of Publication2020
AuthorsSendhil, R., Amuthan, A.
Conference Name2020 International Conference on Electronics and Sustainable Communication Systems (ICESC)
KeywordsBandwidth, Challenges, cloud computing, Cloud vs Fog, Computer architecture, data privacy, edge computing, Fog Computing, Fog Computing and Security, privacy, privacy issues, Privacy-preserving techniques, pubcrawl, Resiliency, Scalability, security, security breach
AbstractBudding technologies like IoT requires minimum latency for performing real-time applications. The IoT devices collect a huge amount of big data and stores in the cloud environment, because of its on-demand services and scalability. But processing the needed information of the IoT devices from the cloud computing environment is found to be time-sensitive one. To eradicate this issue fog computing environment was created which acts an intermediate between the IoT devices and cloud computing environment. The fog computing performs intermediate computation and storage which is needed by IoT devices and it eliminates the drawbacks of latency and bandwidth limitation faced by directly using cloud computing for storage and accessing. The fog computing even though more advantageous it is more exposed to security issues by its architecture. This paper concentrates more on the security issues met by fog computing and the present methods used by the researchers to secure fog with their pros and cons.
Citation Keysendhil_comparative_2020